Performance analysis for security is needed more than ever
https://www.youtube.com/watch?v=d06mx4i1TzU

Performance analysis for security is needed more than ever

Performance issues don't demo well. So, like superheros, performance analysis don't get slaps on the back and promotions for averting disasters. Even at Netflix, where top engineers get paid top dollar, "it took years to get perf. timing logs in".

Typically, those who control priorities don't have direct personal incentive to allocate time for "frivolities" even though hackers use differences in timings to break security mechanisms.

Thus, in 2024, the two biggest bombshell security announcements involved analysis by those who bothered to analyze performance at low levels.

  • Apple "unfixable" Silicon Chip Flaw
  • Linux SSH via XS outbreak (CVE-2024 3094)

___________________________

Analyzing timings is a well-known hacker technique.

Apple's "unfixable" Silicon Chip Flaw

A video from Low Level Coding describes how researchers discovered the logic flow by noticing when it takes longer to do things one way vs. another as the basis for speculative execution from another process ("side channel").

This means that there will be more need for performance analysts to validate implementation of requirements for "constant time architecture" where a function take the same time to perform a security task, regardless of outcome.

XZ SSH Linux

https://nvd.nist.gov/vuln/detail/CVE-2024-3094

gave the vulverability a CVSS score of 10 out of 10 (the most severe possible).

Specifically, a trojan was planted in the LZMZ compression algorithm of utilities for XZ compressed file formats used on Linux operating systems (Debian). Kubernetes also makes use of the utility.

My hero, Andres Freund (not a security researcher at Microsoft), discovered the vulnerability after he dug into why ssh took just a half-second more time when newer (not stable) versions of XZ utilities are installed.

ThePrimeTime channel on YouTube has a one-hour video featuring security researcher @LowLevelLearning's explainer video.

On his OpenWall post, Andres called his discovery "acidental" because he was actually doing regression tests of Postgres database upgrades. He was on this podcast.

All too common root cause

An illustrated explanation is provided by Security Research Thomas Roccia's tweet (as @fr0gger_) shown on Theo's YouTube video described how hackers social-engineered (shamed) the maintainer to transfer maintainer status.

Article content
https://x.com/fr0gger_/status/1774342248437813525

This APT (Advanced Persistent Threat) supply-chain attack was not caught by automated scanners because the back door was not stored in github but  injected by test code that compromised the linker using sophisticated ("genius") obfuscation techniques.

Article content
https://x.com/fr0gger_/status/1775759514249445565

Rob Mensching's blog "A Micrososm of the interactions in Open Source projects" traces the exchange of email how the original maintainer burns out on the "unpaid hobby project”, and only the attacker offers to help (so attacker inherits trust built up by the original maintainer)".

Damien Miller noted (as @djm on Mastodon cybervillians) that the discovery is "nearest of near mises. No system caught this. It was luck and individual heroics."

https://explore.tidelift.com/upstream laments that such a situation is all too common, as illustrated by this famous meme at https://xkcd.com/2347/

Article content


Additional info:

https://www.youtube.com/watch?v=ekh8jIcBulY

Statistics sought from performance/capacity runs






To view or add a comment, sign in

More articles by Wilson Mar, MSc

  • You should be scared. Here's what to do. Now.

    Governments and enterprises are terrified of Anthropic's latest Mythos AI model because it is now smart enough to…

    3 Comments
  • AI Incidents & Hazards Monitor

    An "OECD country" is often used as shorthand for a generally high-income, developed nation. But the 38 countries in…

    1 Comment
  • Blockchain performance breakthrough by LayerZero

    Developers looking to create blockchain (web3 dApps) need to wade through a dizzying number of new technologies…

    3 Comments
  • Encrypt & Decrypt secrets in your .env, the easy way

    If at a Starbucks I walk off without locking my laptop, a malicious stranger could extract .env files on my home folder…

    8 Comments
  • Do your customers prefer fantasy and chaos?

    Do you trust vendors who say "just trust us, our system will handle massive loads!"? Even though a vendor holds SOC2 &…

    2 Comments
  • Hands-on BigO Sorting (Data Science) Python

    For $35 at https://cartesian.app is a masterpiece of Unity3d game engine put to good use -- an interactive book for a…

    1 Comment
  • Programs to find banned words

    #nsf #bannedwords #maga #python #genai Some have reported that content submitted to the NSF (National Science…

    3 Comments
  • Lock Your Social Security Number. Do it now.

    On YouTube, etc. many creators advertise for paid monthly services to notify you when they detect that your identity…

    2 Comments
  • Why AI on your (or your robot's) wrist is a breakthrough

    Several years ago, the UK government, through BBC, gave each student in the UK a micro:bit. Other countries pay $35…

  • MCU IIoT with InductiveAutomation Ignition & AI

    E Building a gingerbread house over the winter holiday is a tradition because we also build memories. Last year we put…

    2 Comments

Others also viewed

Explore content categories